RLSA-2024:2135

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:2135.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:2135
Related
Published
2024-05-10T14:32:42.380544Z
Modified
2024-05-10T14:34:24.800779Z
Summary
Moderate: qemu-kvm security update
Details

Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.

Security Fix(es):

  • QEMU: e1000e: heap use-after-free in e1000ewritepackettoguest() (CVE-2023-3019)

  • QEMU: VNC: infinite loop in inflate_buffer() leads to denial of service (CVE-2023-3255)

  • QEMU: improper IDE controller reset can lead to MBR overwrite (CVE-2023-5088)

  • QEMU: VNC: NULL pointer dereference in qemuclipboardrequest() (CVE-2023-6683)

  • QEMU: am53c974: denial of service due to division by zero (CVE-2023-42467)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Rocky Linux 9.4 Release Notes linked from the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / qemu-kvm

Package

Name
qemu-kvm
Purl
pkg:rpm/rocky-linux/qemu-kvm?distro=rocky-linux-9&epoch=7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7:8.2.0-11.el9_4